CN108563931A - A kind of data security protection method and system - Google Patents

A kind of data security protection method and system Download PDF

Info

Publication number
CN108563931A
CN108563931A CN201810415380.3A CN201810415380A CN108563931A CN 108563931 A CN108563931 A CN 108563931A CN 201810415380 A CN201810415380 A CN 201810415380A CN 108563931 A CN108563931 A CN 108563931A
Authority
CN
China
Prior art keywords
polar plot
data file
data
file
sensitive data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810415380.3A
Other languages
Chinese (zh)
Inventor
张双峻
何华荣
刘兴艾
王志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen United Soft Polytron Technologies Inc
Original Assignee
Shenzhen United Soft Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen United Soft Polytron Technologies Inc filed Critical Shenzhen United Soft Polytron Technologies Inc
Priority to CN201810415380.3A priority Critical patent/CN108563931A/en
Publication of CN108563931A publication Critical patent/CN108563931A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)
  • Image Processing (AREA)

Abstract

The present invention is suitable for data security arts, provides a kind of data security protection method and system, the method includes:When detect user just in access sensitive data file when, generate polar plot at random;The polar plot is made an addition to the white space of the sensitive data file, and records audit information corresponding with the polar plot;File destination is obtained, when detecting in the file destination there are when the polar plot, polar plot generating algorithm is decrypted, obtains the audit information.By adding polar plot in sensitive data file, and it preserves and the audit information corresponding to the polar plot, when the sensitive data file for being added to the quantity figure is illegally propagated, after printing, taking pictures, corresponding audit information can be obtained according to the polar plot, since audit information includes user's name, the source of divulging a secret can be known.

Description

A kind of data security protection method and system
Technical field
The present invention relates to data security arts more particularly to a kind of data security protection method and systems.
Background technology
With being constantly progressive for science and technology, the frequency and speed of information interchange are getting faster, for the number of some need for confidentiality According to file, owner is concerned about the propagation for how preventing these data files very much.
The prior art is there are a kind of printing watermark Anticompromise Technique, water of the attachment with enterprise's mark when generally use prints Print, these watermarks usually all can be obvious and influence printing effect and reading, and watermark is too apparent, can remind and let out Close person propagates again after first handling watermark, prints watermark by attachment to be extremely difficult to by traces raw propagation person, The problem of data file of control need for confidentiality is divulged a secret so that data file owner exists causes nothing because data file is divulged a secret The loss that method is estimated.
Invention content
The embodiment of the present invention provides a kind of data security protection method, it is intended to which solution traces raw propagation in the prior art Person controls the problem of data file of need for confidentiality is divulged a secret.
The embodiment of the present invention is achieved in that the embodiment of the present invention provides a kind of data security protection method comprising:
When detect user just in access sensitive data file when, generate polar plot at random;
The polar plot is made an addition to the white space of the sensitive data file, and is recorded corresponding with the polar plot Audit information;
File destination is obtained, when detecting in the file destination there are when the polar plot, decrypts polar plot generating algorithm, Obtain the audit information;
The audit information includes active user's title, current sensitive data file and vector map data.
The embodiment of the present invention also provides a kind of data security protecting system comprising has:
Polar plot generation unit, for when detect user just in access sensitive data file when, generate polar plot at random;
Print auditing unit, the white space for the polar plot to be made an addition to the sensitive data file, and record Audit information corresponding with the polar plot;
Audit information acquiring unit, for obtaining file destination, when detecting in the file destination, there are the polar plots When, polar plot generating algorithm is decrypted, the audit information is obtained;
The audit information includes active user's title, current sensitive data file and vector map data.
In embodiments of the present invention, by adding polar plot in sensitive data file, and preservation and polar plot institute are right The audit information answered, can be according to this after such as printing, taking pictures when the sensitive data file for being added to the quantity figure is illegally propagated Polar plot obtains corresponding audit information can know the source of divulging a secret since audit information includes user's name.
Description of the drawings
Fig. 1 is a kind of flow chart of data security protection method provided in an embodiment of the present invention;
Fig. 2 printing vector map flow charts provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of data security protecting system provided in an embodiment of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The embodiment of the present invention, can after sensitive data file is transmitted by adding polar plot in sensitive data file To be audited information according to the polar plot, file propagation person is traced, improves data security protecting ability.
Fig. 1 shows a kind of data security protection method provided in an embodiment of the present invention, and details are as follows:
In step S101, whether detection user is just in access sensitive data file, and when testing result is yes, then entrance walks Rapid S102;When testing result is no, then flow restarts.
In embodiments of the present invention, sensitive data file be need to control propagate, the data file of circulation, can be for example, by It is added to certain special tags in the data file, to show security sensitive.
Sensitive data rule is pre-defined, user accesses data is worked as by HOOK technologies as one embodiment of the invention When file, judge to be accessed whether data are sensitive data by rule verification.
In embodiments of the present invention, access can be the operations such as to read, print.
In step s 102, polar plot is generated at random.
In embodiments of the present invention, polar plot is generated by Encryption Algorithm.
As one embodiment of the invention, the polar plot is the dot made an addition in sensitive data file white space. It is using the advantage of dot, it is hidden enough, it is not easy to be found, after can preventing blabber from finding, be removed by technological means It is propagated again after falling watermark, causes subsequently trace the problem of divulging a secret source.
As a preferred embodiment of the invention, the dot is multiple.Using the scheme of multiple dots, even if divulging a secret Person has found one of them or several dot watermarks, and after being handled by technological means, as long as there is also it on the paper of printing Remaining dot watermark, can trace back to immediate blabber.
As a preferred embodiment of the invention, the size of the dot is a pixel, and the dot of the size is enough It is hidden, it is not easy to be found, and data exhibiting will not be blocked, avoid impacting user's vision so that office and reading are more Add smooth.
In step s 103, the polar plot is made an addition to the white space of sensitive data file, and is recorded and the vector Scheme corresponding audit information.
In embodiments of the present invention, the audit information includes active user's title, current sensitive data file and vector Diagram data.
In embodiments of the present invention, the vector map data is for restoring polar plot and its position in sensitive data file It sets, may include dot in X-axis and the coordinate ratio of Y-axis, the character accompanying by character and dot accompanying by dot Several forward and backward character strings.
Due to vector map data contain the character accompanying by character and dot accompanying by dot it is forward and backward several Character string, when can be to avoid a character of only dot corresponding attachment, query result might have repetition, and accuracy is not high The problem of.
As a preferred embodiment of the invention, the number of above-mentioned character string is 5.
In embodiments of the present invention, the dot makes an addition to the lower left of corresponding character according to preset coordinate axis, can prevent from justifying Point with underscore of the addition immediately below character, symbol or punctuate coincide emphatically, influence subsequent polar plot and detect.
As one embodiment of the invention, in practical applications, dot is attached to the position of header and footer in order to prevent, When sensitive data file is A4 lateral lattice, added on A4 paper polar plot ranging from according to the ratio of A4 paper remove it is upper and lower, In left and right 10% regional extent.
In step S104, file destination is obtained, and detects and whether there is polar plot in file destination, if testing result is It is then to enter step S105, if testing result is no, flow terminates.
In step S105, polar plot generating algorithm is decrypted, obtains audit information, so as to be judged according to the audit information It divulges a secret source.
In embodiments of the present invention, by adding polar plot in sensitive data file, and preservation and polar plot institute are right The audit information answered, can be according to arrow after such as printing, taking pictures when the sensitive data file for being added to the quantity figure is illegally propagated Spirogram obtains corresponding audit information can know the source of divulging a secret since audit information includes user's name.
The protection that sensitive data in operation system has been greatly reinforced by this method plays the printing operation of sensitive data To the effect of tracking and monitoring, and controlling unit is introduced in operation system flow, has prevented sensitive data printing circulation way Randomness, further, since the presence of watermark for business personnel sensitive data file each time operation all have deterrent With it is traceable, so that data safety theory is goed deep into a line, the present invention has accomplished that the operation of sensitive data is controllable, to promote sensitive number According to it is safe to use, even if sensitive data actively or passively divulge a secret, it is only necessary to find the polar plot got compromised on object Position blabber for the first time so that the safety of sensitive data file greatly promotes.
As one embodiment of the invention, when tracing sensitive data file source, according to dot adhere to corresponding position with And several character strings before and after dot, inquired in the audit information of system storage most matched as a result, judging to divulge a secret whereby Source.
As a kind of preferred embodiment of the present invention, the quantity of the character string is 5.
As a preferred embodiment of the invention, the sensitive data file captured is analyzed by HOOK technologies, with picture Element is that addition content is analyzed and spliced to unit, adheres to dot under the character of printing using the windows graphic interface GDI provided The data volume of watermark, dot watermark is completed by page configuration at random with size, and dot watermark random printing is not changing user In the case of custom, watermark addition is realized.
With reference to Fig. 2, by a specific print procedure, how explanation adds vector in sensitive data file Figure, and data security protecting is carried out, details are as follows:
In step s 201, administrator enables strategy by WEB interface;
In step S202, background program Provisioning Policy is to client;
In step S203, client reception strategy;
In step S204, user executes printing;
In step S205, vector watermark strategy is judged whether, if so, S206 is thened follow the steps, if it is not, then executing Step S207;
In step S206, printing content is obtained, watermark is generated according to algorithm and is added, and watermark identifier is uploaded to From the background;
In step S207, printing.
Fig. 3 shows a kind of data security protecting system provided in an embodiment of the present invention, for purposes of illustration only, only showing and this Invent relevant part.
Data security protecting system provided in an embodiment of the present invention includes:
Polar plot generation unit 100, for when detect user just in access sensitive data file when, generate vector at random Figure;
In embodiments of the present invention, sensitive document is that the personnel for controlling sensitive data file propagation, circulating is needed to exist in advance It is set in sensitive data file, such as is added to certain special tags in the data file, to show the file of secrecy.
Sensitive data rule is pre-defined, user accesses data is worked as by HOOK technologies as one embodiment of the invention When file, judge to be accessed whether data are sensitive data by rule verification.
In embodiments of the present invention, access can be the operations such as to read, print.
In embodiments of the present invention, polar plot is generated by Encryption Algorithm.
As one embodiment of the invention, the polar plot is the dot made an addition in sensitive data file white space. It is using the advantage of dot, it is hidden enough, it is not easy to be found, after can preventing blabber from finding, be removed by technological means It is propagated again after falling watermark, causes subsequently trace the problem of divulging a secret source.
As a preferred embodiment of the invention, the dot is multiple.Using the scheme of multiple dots, even if divulging a secret Person has found one of them or several dot watermarks, and after being handled by technological means, as long as there is also it on the paper of printing Remaining dot watermark, can trace back to immediate blabber.
As a preferred embodiment of the invention, the size of the dot is a pixel, and the dot of the size is enough It is hidden, it is not easy to be found, and data exhibiting will not be blocked, avoid impacting user's vision so that office and reading are more Add smooth.
Print auditing unit 200, the white space for the polar plot to be made an addition to sensitive data file, and record with The corresponding audit information of the polar plot.
In embodiments of the present invention, the audit information includes active user's title, current sensitive data file and vector Diagram data.
In embodiments of the present invention, the vector map data is for restoring polar plot and its position in sensitive data file It sets, may include dot in X-axis and the coordinate ratio of Y-axis, the character accompanying by character and dot accompanying by dot Several forward and backward character strings.
In embodiments of the present invention, the dot makes an addition to the lower left of corresponding character according to preset coordinate axis.
As one embodiment of the invention, in practical applications, dot is attached to the position of header and footer in order to prevent, When sensitive data file is A4 lateral lattice, added on A4 paper polar plot ranging from according to the ratio of A4 paper remove it is upper and lower, In left and right 10% regional extent.
Audit information acquiring unit 300, for when detecting in the file destination there are when the polar plot, decrypting vector Figure generating algorithm obtains audit information, so as to judge source of divulging a secret according to the audit information.
In embodiments of the present invention, by adding polar plot in sensitive data file, and preservation and polar plot institute are right The audit information answered, can be according to this after such as printing, taking pictures when the sensitive data file for being added to the quantity figure is illegally propagated Polar plot obtains corresponding audit information can know the source of divulging a secret since audit information includes user's name.
The protection that sensitive data in operation system has been greatly reinforced by this method plays the printing operation of sensitive data To the effect of tracking and monitoring, and controlling unit is introduced in operation system flow, has prevented sensitive data printing circulation way Randomness, further, since the presence of watermark for business personnel sensitive data file each time operation all have deterrent With it is traceable, so that data safety theory is goed deep into a line, the present invention has accomplished that the operation of sensitive data is controllable, to promote sensitive number According to it is safe to use, even if sensitive data actively or passively divulge a secret, it is only necessary to find the polar plot got compromised on object Position blabber for the first time so that the safety of sensitive data file greatly promotes.
As one embodiment of the invention, when tracing sensitive data file source, according to dot adhere to corresponding position with And 5 character strings before and after dot, inquired in the audit information of system storage most matched as a result, judging source of divulging a secret whereby.
As a preferred embodiment of the invention, the data captured are analyzed by HOOK technologies, as unit of pixel To analyze and splicing printing content, adhere to dot watermark under the character of printing using the windows graphic interface GDI provided, The data volume of dot watermark is completed by page configuration at random with size, dot watermark random printing.
Wherein, the watermark dot in polar plot is attached to the lower left of each character, and the information of upload includes the X/ of dot The coordinate ratio of Y-axis, the corresponding character of dot attachment, dot adhere to corresponding front and back 5 character strings, the watermark in polar plot Dot attachment number is configured by page policy, and embedded location is random.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (10)

1. a kind of data security protection method, which is characterized in that described method includes following steps:
When detect user just in access sensitive data file when, generate polar plot at random;
The polar plot is made an addition to the white space of the sensitive data file, and records examine corresponding with the polar plot Count information;
File destination is obtained, when detecting in the file destination there are when the polar plot, polar plot generating algorithm is decrypted, obtains The audit information;
The audit information includes active user's title, current sensitive data file and vector map data.
2. data security protection method as described in claim 1, which is characterized in that by HOOK technologies, pre-define sensitivity Data rule judges to be accessed whether data are sensitive data when user accesses data file by rule verification.
3. data security protection method as described in claim 1, which is characterized in that the sensitive data file passes in order to control The data file broadcast, to circulate.
4. data security protection method as described in claim 1, which is characterized in that the sensitive data file is to be added to spy Different label, to show the file of security sensitive.
5. data security protection method as described in claim 3 or 4, which is characterized in that the polar plot is to make an addition to sensitivity Dot in data file white space.
6. a kind of data security protecting system, which is characterized in that the system comprises:
Polar plot generation unit, for when detect user just in access sensitive data file when, generate polar plot at random;
Print auditing unit, the white space for the polar plot to be made an addition to the sensitive data file, and record and institute State the corresponding audit information of polar plot;
Audit information acquiring unit, when detecting in the file destination there are when the polar plot, is solved for obtaining file destination Close polar plot generating algorithm, obtains the audit information;
The audit information includes active user's title, current sensitive data file and vector map data.
7. data security protecting system as claimed in claim 6, which is characterized in that by HOOK technologies, pre-define sensitivity Data rule judges to be accessed whether data are sensitive data when user accesses data file by rule verification.
8. data security protecting system as claimed in claim 6, which is characterized in that the sensitive data file passes in order to control The data file broadcast, to circulate.
9. data security protecting system as claimed in claim 6, which is characterized in that the sensitive data file is to be added to spy Different label, to show the file of security sensitive.
10. data security protecting system as claimed in claim 8 or 9, which is characterized in that the polar plot is to make an addition to sensitivity Dot in data file white space.
CN201810415380.3A 2015-08-12 2015-08-12 A kind of data security protection method and system Pending CN108563931A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810415380.3A CN108563931A (en) 2015-08-12 2015-08-12 A kind of data security protection method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510491248.7A CN105095791B (en) 2015-08-12 2015-08-12 A kind of data security protection method and system
CN201810415380.3A CN108563931A (en) 2015-08-12 2015-08-12 A kind of data security protection method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510491248.7A Division CN105095791B (en) 2015-08-12 2015-08-12 A kind of data security protection method and system

Publications (1)

Publication Number Publication Date
CN108563931A true CN108563931A (en) 2018-09-21

Family

ID=54576190

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810415380.3A Pending CN108563931A (en) 2015-08-12 2015-08-12 A kind of data security protection method and system
CN201510491248.7A Active CN105095791B (en) 2015-08-12 2015-08-12 A kind of data security protection method and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201510491248.7A Active CN105095791B (en) 2015-08-12 2015-08-12 A kind of data security protection method and system

Country Status (1)

Country Link
CN (2) CN108563931A (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106228075A (en) * 2016-07-18 2016-12-14 刘日初 A kind of document handling method and device
CN106228083A (en) * 2016-07-18 2016-12-14 刘日初 A kind of document handling method, device, server and terminal
CN108229180B (en) * 2016-12-09 2022-02-08 阿里巴巴集团控股有限公司 Screenshot data processing method and device and electronic equipment
CN108174051B (en) * 2017-12-08 2019-11-08 新华三技术有限公司 A kind of vector watermark decoding method, device and electronic equipment
CN108520181B (en) * 2018-03-26 2022-04-22 联想(北京)有限公司 Data model training method and device
CN113342288B (en) * 2021-06-29 2024-03-22 北京天空卫士网络安全技术有限公司 Data protection method, client, server and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308541A (en) * 2007-05-16 2008-11-19 北京中富利泰科技发展有限公司 Method for embedding computer data out of text handwriting
CN101482887A (en) * 2009-02-18 2009-07-15 北京数码视讯科技股份有限公司 Anti-tamper verification method for key data in database
CN101894239A (en) * 2010-08-12 2010-11-24 武汉大学 Method and system for auditing and distributing sensitive data based on evolution strategy
CN102143158A (en) * 2011-01-13 2011-08-03 北京邮电大学 Data anti-leakage method based on trusted platform module (TPM)
CN104462995A (en) * 2014-11-28 2015-03-25 福建畅云安鼎信息科技有限公司 Digital processing safety protection system
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100461215C (en) * 2007-10-29 2009-02-11 中国人民解放军信息工程大学 Map data rasterizing based robust blind water mark embedding and extraction method
CN102541482B (en) * 2010-12-27 2015-01-21 北大方正集团有限公司 Method and system for document printing control and document tracing
CN102622560A (en) * 2011-01-27 2012-08-01 昆山玛斯特软件有限公司 Method for preventing electronic secret documents from being divulged in shooting or printing mode
CN102930634B (en) * 2012-10-31 2015-10-28 浪潮软件集团有限公司 Invoice true-check system based on cloud computing and encrypted two-dimensional code
CN103886539A (en) * 2014-02-26 2014-06-25 浙江工业大学 Embedding and detection method of circular characteristic digit fingerprint
CN104794677A (en) * 2015-05-05 2015-07-22 哈尔滨工程大学 Vector map watermark method based on space geometric features

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308541A (en) * 2007-05-16 2008-11-19 北京中富利泰科技发展有限公司 Method for embedding computer data out of text handwriting
CN101482887A (en) * 2009-02-18 2009-07-15 北京数码视讯科技股份有限公司 Anti-tamper verification method for key data in database
CN101894239A (en) * 2010-08-12 2010-11-24 武汉大学 Method and system for auditing and distributing sensitive data based on evolution strategy
CN102143158A (en) * 2011-01-13 2011-08-03 北京邮电大学 Data anti-leakage method based on trusted platform module (TPM)
CN104462995A (en) * 2014-11-28 2015-03-25 福建畅云安鼎信息科技有限公司 Digital processing safety protection system
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method

Also Published As

Publication number Publication date
CN105095791A (en) 2015-11-25
CN105095791B (en) 2018-07-03

Similar Documents

Publication Publication Date Title
CN105095791B (en) A kind of data security protection method and system
Al Hamid et al. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography
Al‐Haj et al. Crypto‐based algorithms for secured medical image transmission
CN107315968B (en) A kind of data processing method and equipment
JP5269033B2 (en) Image privacy masking method and apparatus
KR101378295B1 (en) Method and Apparatus of privacy masking on Image
CN105260148B (en) Printing document Jianzhen source tracing method and system based on electronic tag
Hakak et al. Preserving content integrity of digital holy Quran: Survey and open challenges
US20130011068A1 (en) Policy-Based Image Management
WO2016115889A1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
US9608811B2 (en) Managing access to a secure digital document
CN106407820B (en) Method and system for preventing file from being tampered and leaked through watermark encryption
Zhang et al. F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption
KR101429304B1 (en) Entering confidential information on an untrusted machine
WO2019134276A1 (en) Method and system for protecting web page code, storage medium, and electronic device
CN110032877A (en) Image access method and its system
CN101641701A (en) Device and method for digital processing management of content so as to enable an imposed work flow
US20140115331A1 (en) Secure Information Transfer Via Bar Codes
Mubarak et al. A critical review on RFID system towards security, trust, and privacy (STP)
Konings et al. PrivacyJudge: Effective privacy controls for online published information
CN106844006A (en) Based on data prevention method and system under virtualized environment
CN107862210A (en) Cipher processing method, system and computer equipment
Pilania et al. Digitization through SNS: issues, challenges, and recommendations—a case study
Prokos et al. Squint hard enough: Attacking perceptual hashing with adversarial machine learning
Sharma et al. A more private & secure e-mail system using image steganography (EPS) and data mining

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180921

RJ01 Rejection of invention patent application after publication